top of page

Dead Man's Scores: Seven Intelligence Frameworks Applied to the Epstein Network — And the Kill Chain They Reveal

  • Writer: Patrick Duggan
    Patrick Duggan
  • Feb 24
  • 5 min read

# Dead Man's Scores: Seven Intelligence Frameworks Applied to the Epstein Network — And the Kill Chain They Reveal


*Published by DugganUSA LLC | February 24, 2026*

*All frameworks applied to 329,000+ DOJ documents, searchable at epstein.dugganusa.com*




Jeffrey Epstein ran a kill chain.


Not a metaphorical one. A literal Lockheed Martin Cyber Kill Chain — the same model the Pentagon uses to map adversary operations — executed in meatspace against minors, with intelligence agency tradecraft, for decades.


**Reconnaissance.** Identify vulnerable girls through modeling agencies, schools, massage listings. Jean-Luc Brunel's MC2 agency. Sarah Kellen's scheduling apparatus. Ghislaine Maxwell's social radar.


**Weaponization.** Prepare the infrastructure: the Manhattan townhouse, the Palm Beach mansion, the island, the New Mexico ranch. Private jets as delivery vehicles. NDAs as digital rights management for human trafficking.


**Delivery.** Get the victim to the location. Brunel delivers models. Kellen manages the calendar. Maxwell makes the introduction feel social, casual, safe.


**Exploitation.** The abuse itself. Documented in over 329,000 DOJ files. Depositions. Flight logs. Victim testimony that would fill a library of horror.


**Installation.** Lock the victim in: NDAs, hush payments funneled through attorneys, threats, social pressure. The same NDA playbook Harvey Weinstein and Leslie Moonves ran — the same lawyers, the same PR fixers, the same crisis management firms.


**Command and Control.** Epstein as the switchboard. Every powerful person with a secret became a node in his network. Israeli intelligence through Ehud Barak. Political leverage through Trump and Clinton. Financial infrastructure through Wexner, Black, and Staley. Media control through Wolff and Bezos. Academic cover through Summers, Brockman, and the Edge Foundation. Epstein didn't work *for* any one power — he was the router through which they all connected.


**Actions on Objective.** Intelligence extraction. Blackmail. Geopolitical leverage. $148 million from Leon Black for "advisory services" that nobody can explain. A $46 million mansion from Les Wexner through a power of attorney that nobody can justify. Access to a sitting president, a future president, a former president, a prime minister, a prince, and the crown prince of Saudi Arabia.


That's a kill chain. And we can prove it.


Why Seven Frameworks?



Because no single lens captures the full picture. Every intelligence agency, every military service, every security team picks *one* framework and calls it analysis. That's like diagnosing cancer with only an X-ray.


We applied seven. All seven are now live, interactive, scored across 34 targets, and built on the same 329,000+ government-released documents.


**CARVER** (US Army SOCOM) — *Who should we investigate next?*

Military targeting methodology. Six dimensions: Criticality, Accessibility, Recuperability, Vulnerability, Effect, Recognizability. Score: /30. This is the framework that identified Ghislaine Maxwell (25/30), Trump (27/30), and Bill Gates (24/30) as top targets *before* the House Oversight Committee data confirmed it.


**DREAD** (Microsoft) — *How bad is it when the evidence goes public?*

Software security risk model adapted for exposure assessment. Damage, Reproducibility, Exploitability, Affected Users, Discoverability. Score: /50. Maxwell tops at 48/50. The evidence can't be un-discovered.


**ACH** (CIA) — *Whose innocent explanation has been destroyed by evidence?*

Analysis of Competing Hypotheses, developed by Richards Heuer at the CIA Directorate of Intelligence in 1999. The gold standard for eliminating bias. For each target: can any *benign* hypothesis survive the evidence? For Maxwell: no. For Trump ("I wasn't a fan"): no — 480 documents contradict it. For Elon Musk ("photobomb"): barely. ACH doesn't prove guilt. It proves which defenses are mathematically dead. Score: /10.


**PMESII-PT** (Joint Pub 2-01.3) — *What role does each person play in the machine?*

Operational environment mapping. Political, Military/Intelligence, Economic, Social, Infrastructure, Information, Physical, Time. Eight dimensions, scored /40. This is where Robert Maxwell (dead since 1991) scores 28/40 — because he *built* the machine. Ghislaine scores 38/40 — she's the only person who touches every dimension.


**IPB** (FM 2-01.3) — *Where are we blind?*

Intelligence Preparation of the Battlefield. Maps not what we *know*, but what we *don't know* and where to look. Four dimensions: Mapped, Gaps, Indicators, Priority. Trump scores 37/40 — the DOJ is *actively creating intelligence gaps* (NPR confirmed 53 missing pages). Ehud Barak scores 33/40 — Israeli intelligence files are a black hole. Sarah Kellen scores 33/40 — her scheduling records are the Rosetta Stone that could decode the entire network. They remain unmapped.


**Diamond Model** (Caltagirone et al., 2013) — *How does the intrusion network connect?*

Four vertices: Adversary, Capability, Infrastructure, Victim. Applied to map who connects to whom and through what means. Maxwell: 39/40 centrality — she touches everything. Sarah Kellen: 33/40 — operational infrastructure. Alexander Acosta: 33/40 — he built the infrastructure of impunity.


**COA** (Joint Pub 5-0) — *What will they do when cornered?*

Course of Action analysis: Most Likely COA and Most Dangerous COA for each target. Trump: MLCOA is DOJ scrubbing and executive privilege. MDCOA is weaponizing DOGE to purge federal records entirely. Ghislaine Maxwell: MLCOA is appeals. MDCOA is full cooperation — if she names everyone, the entire network detonates. Sarah Kellen: MDCOA is cooperation with scheduling records. That's the nuclear option.


The Real-Time Validation



Five days before Peter Mandelson was arrested, DugganUSA had published three blog posts documenting his connections in the Epstein files. When we scored him on CARVER after the arrest, he tied for first place at 27/30 — alongside Trump, Gates, and Prince Andrew.


This isn't prediction. It's evidence-driven prioritization. The frameworks don't tell you who's guilty. They tell you where the evidence is most concentrated, most damaging, and most urgent. When the real world catches up — as it did with Mandelson — the scores don't change. They were already right.


What This Demonstrates



A two-person company in Minneapolis is applying seven distinct intelligence, military, and security frameworks — from three different agencies, two governments, and the private sector — to the largest trove of government-released documents in investigative history. The frameworks are interactive. The data is live. The scores update as new documents enter the index.


This is what threat analysis looks like when it's applied to the actual threat.


Every framework is live now at [epstein.dugganusa.com](https://epstein.dugganusa.com). Every document is searchable. Every score is derived from government-released evidence.


And Kill Chain? That's next.




**Live Framework Suite:**

- [CARVER Matrix](https://epstein.dugganusa.com/carver-matrix.html) — Targeting Priority (SOCOM)

- [DREAD Matrix](https://epstein.dugganusa.com/dread-matrix.html) — Risk Assessment (Microsoft)

- [ACH Matrix](https://epstein.dugganusa.com/ach-matrix.html) — Hypothesis Elimination (CIA)

- [PMESII-PT Matrix](https://epstein.dugganusa.com/pmesii-matrix.html) — Operational Environment (JP 2-01.3)

- [IPB Matrix](https://epstein.dugganusa.com/ipb-matrix.html) — Evidence Terrain (FM 2-01.3)

- [Diamond Model](https://epstein.dugganusa.com/diamond-matrix.html) — Intrusion Analysis (Caltagirone)

- [COA Matrix](https://epstein.dugganusa.com/coa-matrix.html) — Course of Action (JP 5-0)


**Search it yourself:** [epstein.dugganusa.com](https://epstein.dugganusa.com)


**Support the investigation:** [epstein.dugganusa.com/donate.html](https://epstein.dugganusa.com/donate.html)


*DugganUSA LLC indexes only government-released documents. Every finding is the government's own narrative, made searchable. Two people. $500/month. Zero outside funding. 95% epistemic cap.*





*Her name was Renee Nicole Good.*


*His name was Alex Jeffery Pretti.*

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page